General
-
Target
documents.exe
-
Size
488KB
-
Sample
250113-n8k2bs1nfw
-
MD5
bf94dfb3c600fea20a0eb3b6f2ce410f
-
SHA1
9be4b304813ff777c1f5aa753dabe2b4aeb07391
-
SHA256
0b7faafb8da0c827bd09a35795d30bb4a703e6ad53c5ca99cfdd1cbfd63dd55f
-
SHA512
00c72914e7344bb25b20296cb215bd3c53246eb4b55ca176ffb2a9226444d0ba992699337c76815e6a127738a8d616e466f06e2b3808e73397dc54eddf60891a
-
SSDEEP
6144:IuaNeIQv1dV4sXmFr7LAFIzT/72clnlePVTn0L9DEBDYTU6qynIHtc+KC:3SDQ3usXmFr70FGxlkn0LJYDiU6qyat
Static task
static1
Behavioral task
behavioral1
Sample
documents.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
documents.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
remcos
Yavakosa
198.23.227.212:32583
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
yavascript.exe
-
copy_folder
xenor
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DCHPS3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
documents.exe
-
Size
488KB
-
MD5
bf94dfb3c600fea20a0eb3b6f2ce410f
-
SHA1
9be4b304813ff777c1f5aa753dabe2b4aeb07391
-
SHA256
0b7faafb8da0c827bd09a35795d30bb4a703e6ad53c5ca99cfdd1cbfd63dd55f
-
SHA512
00c72914e7344bb25b20296cb215bd3c53246eb4b55ca176ffb2a9226444d0ba992699337c76815e6a127738a8d616e466f06e2b3808e73397dc54eddf60891a
-
SSDEEP
6144:IuaNeIQv1dV4sXmFr7LAFIzT/72clnlePVTn0L9DEBDYTU6qynIHtc+KC:3SDQ3usXmFr70FGxlkn0LJYDiU6qyat
Score10/10-
Remcos family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-